At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Server device for transmitting and receiving data to and from client
device through access point
A server device for transmitting and receiving data to and from a client device over a wireless communication network including an access point, the server...
Nonvolatile memory, reading method of nonvolatile memory, and memory
system including nonvolatile memory
A nonvolatile memory device includes a memory cell array and a read/write circuit connected to the memory cell array through bit lines. The read method of the...
Image reading apparatus
An image reading apparatus includes an image data compression unit, an attribute data compression unit, and a memory. Of image data and attribute data generated...
System and method for combining deduplication and encryption of data
The embodiments herein relate to data management and, more particularly, to global deduplication and encryption of data in data management systems. The user...
Storage device, control method for same and system management program
A storage device has plural data disks including a primary data area and a backup data area. Performance and reliability are secured while conserving power. A...
Methods and systems for assessing security risks
A user interface facilitates assessing security risks for linear corridors. The interface includes a navigation window presenting geospatial data for an area...
Custom function blocks for use with process control systems
A system and method for creating and incorporating a function block within a process control system enables a user of the process control system to generate a...
Cryopreservation device with retrofitted electronic tracking device
The present invention is a cryopreservation device that has the ability to track and record preserved specimens using an integrated electronics system. The...
System and method for data verification using a smart phone
A system and method for data verification using a smart phone which verifies data and biometric identity information using only locally stored biometric...
Systems and methods for secure intermediary data transfers using close
proximity wireless communication
The present disclosure provides systems and methods for utilizing close proximity wireless communication (CPWC) technology for a secure out-of-band (OOB)...
Two-dimensional barcode system
An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an...
Network independent location services
Techniques for supporting network independent location services (LCS) are described. In one design, a location center may communicate with a terminal to...
Network defense system and framework for detecting and geolocating botnet
A network defense system is described that provides network sensor infrastructure and a framework for managing and executing advanced cyber security algorithms...
Systems and methods for determining that uniform resource locators are
A computer-implemented method for determining that uniform resource locators are malicious may include identifying a uniform resource locator that may be posted...
Method and apparatus for generating highly predictive blacklists
In one embodiment, the present invention is a method and apparatus for generating highly predictive blacklists. One embodiment of a method for generating a...
System and method of accessing keys for secure messaging
Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the...
Apparatus and method of providing security to cloud data to prevent
A method and apparatus for providing security of an electronic apparatus are provided. The method includes identifying an environment of a client to be provided...
Systems and methods for providing multimedia content within an application
and a security solution integrated...
A system is provided for downloading, for distribution and for acoustic reproduction of a music album, which includes at least one or several digital music...
Encryption/decryption device for secure communications between a protected
network and an unprotected network...
The encryption/decryption device includes a plaintext unit, a ciphertext unit and a cryptographic unit connected therebetween. The plaintext unit may include a...
Service communication method and system for access network apparatus
A service communication method for an access network apparatus. The access network apparatus comprises a source terminal and a target terminal both connected to...
Method and system for propagating a client identity
A method and system for securely propagating client identities in a service call from a first system to a target service system are provided. The system...
Securing virtual lane physical layers
A data stream with a given data rate is distributed into a plurality of virtual lanes or streams, each with a lower data rate than the data stream. Virtual...
System and method of lawful access to secure communications
The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to...
Visually evident connection system for plug-in power/data cable
A visually evident connection system for a plug-in power/data cable including a power/data cable connector securable to a power/data cable. The connector is...
Method for securely dematerializing the transfer of evidence in
data-stream production systems, in particular...
A method including putting in place an end-to-end secure network, digitally signing the recorded data, regardless of its type, encrypting the recorded sensitive...
Vehicle access and security based on biometrics
Method for interacting with a vehicle includes controlling interaction with the vehicle based on receipt of a signal by a component on the vehicle, and...
System and method for guided passcode entry
Systems and methods are provided for facilitating guided entry of a passcode. The exemplary guided passcode entry system provides additional security to...
Secure payment card transactions
Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal,...
Virtualization and secure processing of data
Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the...
Data distribution database and method for data distribution and
A distribution database includes at least one central database, in which data of use-value given by data a releaser and the values of use are stored, and...
Data security device
The invention provides an apparatus for storing data using solid state technology. The apparatus is configured to employ a destruction mechanism that damages...
Systems and methods for providing secure electronic document storage,
retrieval and use with electronic user...
Systems and methods for efficient and timely electronic new user authentication in a digital mailbox system using a sliding scale approach to include one or...
Wireless portable device for creating and wirelessly transmitting digital
audio and/or video
A portable wireless communications subscriber audio and/or video player apparatus and system and method for selecting, requesting, downloading, and playing...
Automatic language sensitive, event based activity feeds
A post is generated that identifies different types of activity in a computer system, such as changes to the data in the computer system. The post is generated...
Provision to an application of a random number not generated by an
A data processing system includes data storage that stores an operating system and an application that performs a security operation and a processor...
Generation of electronic books
Described herein are systems and methods for modifying electronic books ("eBooks"). A server processes eBook data to determine portions of one or more source...
File processing method and storage device
A file processing method and a storage device are disclosed. In the method, a storage device receives T files that are to be stored in the RAID, and determines...
Configurable data measurement and acquisition systems for multi-slice
X-ray computed tomography systems
A Data Measurement and Acquisition System (DMAS) for multi-slice X-ray CT systems and multi-slice X-ray CT systems using the DMAS are disclosed; wherein the...
System and method for secure identity service
A system and method for securely processing identity information. For example, in one embodiment of the invention, a first user is registered on an identity...
Systems and methods for nextproto negotiation extension handling using
This disclosure is directed to systems and methods for handling the processing of a next protocol negotiation extension for a transport layer security (TLS)...
Method for securing name registries, network access and data communication
in ID/locator split-base networks
The invention provides a new system for internet security. The internet network system comprises a first Edge Network 11 that comprises a Source Host (SH) 12, a...
Messaging security device
In one embodiment, a system can comprise an interface that receives data related to a communication session and a messaging security device component that...
Flow ownership assignment in a distributed processor system
A security device for processing network flows includes one or more packet processors configured to receive incoming data packets associated with one or more...
System and method for establishing an encrypted communication link based
on IP address lookup requests
A network device stores an application program for a secure communications service and has processor configured to execute the application program. The...
Preservation of user data privacy in a network
An example apparatus is provided that receives a pseudonym and encrypted identifier, where the pseudonym is of a user's personal data. The pseudonym has been...
System and method for data center security enhancements leveraging managed
A data center security system and method are provided that leverage server systems on a chip (SOCs) and/or server fabrics. In more detail, server interconnect...
System and method for securely transmitting data via an electronic
The present system and method comprises an improved marketplace for providing and consuming services. Using the present system, generally via one or more APIs,...
Generating secure private keys for use in a public key communications
A private key is generated for use in a public key communications environment, and the private key includes a partial private key and processed biometric data....
Secure threshold decryption protocol computation
The present invention relates to a method of converting an encrypted data set into an encryption of individual bits representing the data set. Further, the...
Automatic security action invocation for mobile communications device
A mobile communications device, method, and computer program product for providing security on a mobile communications device are described. In accordance with...